Moderate severityNVD Advisory· Published Mar 27, 2020· Updated Aug 4, 2024
Kubernetes API server denial of service
CVE-2020-8552
Description
The Kubernetes API server component in versions prior to 1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via successful API requests.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
k8s.io/apiserverGo | < 0.15.10 | 0.15.10 |
k8s.io/apiserverGo | >= 0.16.0, < 0.16.7 | 0.16.7 |
k8s.io/apiserverGo | >= 0.17.0, < 0.17.3 | 0.17.3 |
Affected products
1- Range: unspecified
Patches
15978856c4c7fMerge pull request #87669 from logicalhan/client-label
4 files changed · +7 −84
staging/src/k8s.io/apiserver/pkg/endpoints/metrics/BUILD+0 −8 modified@@ -3,13 +3,6 @@ package(default_visibility = ["//visibility:public"]) load( "@io_bazel_rules_go//go:def.bzl", "go_library", - "go_test", -) - -go_test( - name = "go_default_test", - srcs = ["metrics_test.go"], - embed = [":go_default_library"], ) go_library( @@ -20,7 +13,6 @@ go_library( deps = [ "//staging/src/k8s.io/apimachinery/pkg/apis/meta/v1/validation:go_default_library", "//staging/src/k8s.io/apimachinery/pkg/types:go_default_library", - "//staging/src/k8s.io/apimachinery/pkg/util/net:go_default_library", "//staging/src/k8s.io/apimachinery/pkg/util/sets:go_default_library", "//staging/src/k8s.io/apiserver/pkg/endpoints/request:go_default_library", "//staging/src/k8s.io/apiserver/pkg/features:go_default_library",
staging/src/k8s.io/apiserver/pkg/endpoints/metrics/metrics.go+3 −18 modified@@ -31,7 +31,6 @@ import ( "k8s.io/apimachinery/pkg/apis/meta/v1/validation" "k8s.io/apimachinery/pkg/types" - utilnet "k8s.io/apimachinery/pkg/util/net" utilsets "k8s.io/apimachinery/pkg/util/sets" "k8s.io/apiserver/pkg/endpoints/request" "k8s.io/apiserver/pkg/features" @@ -65,14 +64,14 @@ var ( requestCounter = compbasemetrics.NewCounterVec( &compbasemetrics.CounterOpts{ Name: "apiserver_request_total", - Help: "Counter of apiserver requests broken out for each verb, dry run value, group, version, resource, scope, component, client, and HTTP response contentType and code.", + Help: "Counter of apiserver requests broken out for each verb, dry run value, group, version, resource, scope, component, and HTTP response contentType and code.", StabilityLevel: compbasemetrics.ALPHA, }, // The label_name contentType doesn't follow the label_name convention defined here: // https://github.com/kubernetes/community/blob/master/contributors/devel/sig-instrumentation/instrumentation.md // But changing it would break backwards compatibility. Future label_names // should be all lowercase and separated by underscores. - []string{"verb", "dry_run", "group", "version", "resource", "subresource", "scope", "component", "client", "contentType", "code"}, + []string{"verb", "dry_run", "group", "version", "resource", "subresource", "scope", "component", "contentType", "code"}, ) longRunningRequestGauge = compbasemetrics.NewGaugeVec( &compbasemetrics.GaugeOpts{ @@ -256,9 +255,8 @@ func RecordLongRunning(req *http.Request, requestInfo *request.RequestInfo, comp func MonitorRequest(req *http.Request, verb, group, version, resource, subresource, scope, component, contentType string, httpCode, respSize int, elapsed time.Duration) { reportedVerb := cleanVerb(verb, req) dryRun := cleanDryRun(req.URL) - client := cleanUserAgent(utilnet.GetHTTPClient(req)) elapsedSeconds := elapsed.Seconds() - requestCounter.WithLabelValues(reportedVerb, dryRun, group, version, resource, subresource, scope, component, client, contentType, codeToString(httpCode)).Inc() + requestCounter.WithLabelValues(reportedVerb, dryRun, group, version, resource, subresource, scope, component, contentType, codeToString(httpCode)).Inc() requestLatencies.WithLabelValues(reportedVerb, dryRun, group, version, resource, subresource, scope, component).Observe(elapsedSeconds) // We are only interested in response sizes of read requests. if verb == "GET" || verb == "LIST" { @@ -376,19 +374,6 @@ func cleanDryRun(u *url.URL) string { return strings.Join(utilsets.NewString(dryRun...).List(), ",") } -func cleanUserAgent(ua string) string { - // We collapse all "web browser"-type user agents into one "browser" to reduce metric cardinality. - if strings.HasPrefix(ua, "Mozilla/") { - return "Browser" - } - // If an old "kubectl.exe" has passed us its full path, we discard the path portion. - if kubectlExeRegexp.MatchString(ua) { - // avoid an allocation - ua = kubectlExeRegexp.ReplaceAllString(ua, "$1") - } - return ua -} - // ResponseWriterDelegator interface wraps http.ResponseWriter to additionally record content-length, status-code, etc. type ResponseWriterDelegator struct { http.ResponseWriter
staging/src/k8s.io/apiserver/pkg/endpoints/metrics/metrics_test.go+0 −54 removed@@ -1,54 +0,0 @@ -/* -Copyright 2015 The Kubernetes Authors. - -Licensed under the Apache License, Version 2.0 (the "License"); -you may not use this file except in compliance with the License. -You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - -Unless required by applicable law or agreed to in writing, software -distributed under the License is distributed on an "AS IS" BASIS, -WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -See the License for the specific language governing permissions and -limitations under the License. -*/ - -package metrics - -import "testing" - -func TestCleanUserAgent(t *testing.T) { - panicBuf := []byte{198, 73, 129, 133, 90, 216, 104, 29, 13, 134, 209, 233, 30, 0, 22} - - for _, tc := range []struct { - In string - Out string - }{ - { - In: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36", - Out: "Browser", - }, - { - In: "kubectl/v1.2.4", - Out: "kubectl/v1.2.4", - }, - { - In: `C:\Users\Kubernetes\kubectl.exe/v1.5.4`, - Out: "kubectl.exe/v1.5.4", - }, - { - In: `C:\Program Files\kubectl.exe/v1.5.4`, - Out: "kubectl.exe/v1.5.4", - }, - { - // This malicious input courtesy of enisoc. - In: string(panicBuf) + "kubectl.exe", - Out: "kubectl.exe", - }, - } { - if cleanUserAgent(tc.In) != tc.Out { - t.Errorf("Failed to clean User-Agent: %s", tc.In) - } - } -}
staging/src/k8s.io/apiserver/pkg/server/healthz/healthz_test.go+4 −4 modified@@ -254,11 +254,11 @@ func TestMetrics(t *testing.T) { } expected := strings.NewReader(` - # HELP apiserver_request_total [ALPHA] Counter of apiserver requests broken out for each verb, dry run value, group, version, resource, scope, component, client, and HTTP response contentType and code. + # HELP apiserver_request_total [ALPHA] Counter of apiserver requests broken out for each verb, dry run value, group, version, resource, scope, component, and HTTP response contentType and code. # TYPE apiserver_request_total counter - apiserver_request_total{client="unknown",code="200",component="",contentType="text/plain; charset=utf-8",dry_run="",group="",resource="",scope="",subresource="/healthz",verb="GET",version=""} 1 - apiserver_request_total{client="unknown",code="200",component="",contentType="text/plain; charset=utf-8",dry_run="",group="",resource="",scope="",subresource="/livez",verb="GET",version=""} 1 - apiserver_request_total{client="unknown",code="200",component="",contentType="text/plain; charset=utf-8",dry_run="",group="",resource="",scope="",subresource="/readyz",verb="GET",version=""} 1 + apiserver_request_total{code="200",component="",contentType="text/plain; charset=utf-8",dry_run="",group="",resource="",scope="",subresource="/healthz",verb="GET",version=""} 1 + apiserver_request_total{code="200",component="",contentType="text/plain; charset=utf-8",dry_run="",group="",resource="",scope="",subresource="/livez",verb="GET",version=""} 1 + apiserver_request_total{code="200",component="",contentType="text/plain; charset=utf-8",dry_run="",group="",resource="",scope="",subresource="/readyz",verb="GET",version=""} 1 `) if err := testutil.GatherAndCompare(legacyregistry.DefaultGatherer, expected, "apiserver_request_total"); err != nil { t.Error(err)
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
11- github.com/advisories/GHSA-82hx-w2r5-c2wqghsaADVISORY
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/mitrevendor-advisoryx_refsource_FEDORA
- nvd.nist.gov/vuln/detail/CVE-2020-8552ghsaADVISORY
- github.com/kubernetes/kubernetes/commit/5978856c4c7f10737a11c9540fe60b8475beecbbghsaWEB
- github.com/kubernetes/kubernetes/issues/89378ghsax_refsource_MISCWEB
- github.com/kubernetes/kubernetes/pull/87669ghsaWEB
- groups.google.com/forum/ghsaWEB
- groups.google.com/forum/mitrex_refsource_MISC
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LXghsaWEB
- security.netapp.com/advisory/ntap-20200413-0003ghsaWEB
- security.netapp.com/advisory/ntap-20200413-0003/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.